Repository logo
  • English
  • Català
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
Repository logo
    Communities & Collections
    All of DSpace
  • English
  • Català
  • ÄŒeÅ¡tina
  • Deutsch
  • Español
  • Français
  • Gàidhlig
  • Italiano
  • LatvieÅ¡u
  • Magyar
  • Nederlands
  • Polski
  • Português
  • Português do Brasil
  • Srpski (lat)
  • Suomi
  • Svenska
  • Türkçe
  • Tiếng Việt
  • Log In
    New user? Click here to register. Have you forgotten your password?
  1. Home
  2. Browse by Author

Browsing by Author "Livingstone, Danny"

Now showing 1 - 1 of 1
Results Per Page
Sort Options
  • No Thumbnail Available
    Item
    Addressing security problems of computer network services: the case of University of Dar es Salaam network
    (University of Dar es Salaam, 2009) Livingstone, Danny
    Use of information technology is essential to most enterprises today and information security is now critical. User authentication, access control and the control of malicious logics is essential in service-oriented computer networks to identify and reject any unauthorized or suspicious network access. This work has concentrated on improvement of computer network security posture of UDSM as a case study. It consists of a comprehensive literature review on network security, which serves as a foundation of the research. The current security measures have been analysed based on ISO 17799. The data gathering instruments used was questionnaire with multiple choice questions, open-ended questions, and interviews to some selected respondents. Findings show that malicious software (malware) is the severe problem which the UDSM network suffers from. The study shows that users are aware of the danger imposed by malware; however, the weakness is on the control of their introduction into systems. Also Bad/Inadequate security practices resulted mainly from lack of clarity over ICT security responsibilities to users, IT staff and management. Thus, results of this study suggest that most of the good-to-have security practices as suggested by ISO 17799 are not part and parcel of day to day UDSM network security practices. It is therefore necessary that ICT security policy, access control procedures and communications and operations management be observed and where necessary be revisited and necessary amendments made to minimize security risks to an acceptable level. Given the observed problems, measures have been proposed in the dissertation to address the problems and improve the security posture of the UDSM network.

About Library

The University of Dar es Salaam Library is a vital source of scholarly information that facilitates users to get access to learning and research resources during their studies. It provides access to a wide range of resources in both print and digital formats and conducive reading environment for users, regardless of their physical conditions. All registered users are eligible to access library resources and can borrow print materials from general shelves for a specific period of time.

Useful Links

Koha Staff Login

University Research Repository

WebMail

Aris

Book Study Room

Mara Oral History

Hansard

SOCIAL MEDIA

Instagram

Facebook

Twitter

YouTube

WhatsApp

Ask Librarian

Contact Us

Postal Address
P.O.Box 35092
Dar es Salaam

Call Us: +255 22 2410500/9 Ext. 2165 ; Direct line +255 22 2410241

Fax No:: +255 22 2410241

Email:: directorlibrary@udsm.ac.tz

2025 University of Dar es Salaam - University Of Dar Es Salaam Library
Term of use / Privacy Policy